General
-
Target
03b07e53297c2d8bb8b214673c909a8b107f1e67948688d47980dbe2af70b7df
-
Size
555KB
-
Sample
230804-x6kr8afc7w
-
MD5
ad5fd0e798159e2fd5c9c0e0cd08d9ac
-
SHA1
dee745bddd6ce3a96fbe3d4e78c91d1567a90c0d
-
SHA256
03b07e53297c2d8bb8b214673c909a8b107f1e67948688d47980dbe2af70b7df
-
SHA512
91052f628d3f2d8b1986d0dbdb58044cfe70ca0d8244443fd3c55473c43058261861e68c134f458d8eee5b897511a36e8bc80f34e5f712ee2b79a4f4cd889f7d
-
SSDEEP
12288:qMruy90ROzppoOh2uLcXITqtmvAmdmqaRdDkgBYCGz56DBVJT/qSGCmhh:4ygOdGyIDyVdmqaR9rzCYFT/jfYh
Static task
static1
Behavioral task
behavioral1
Sample
03b07e53297c2d8bb8b214673c909a8b107f1e67948688d47980dbe2af70b7df.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Targets
-
-
Target
03b07e53297c2d8bb8b214673c909a8b107f1e67948688d47980dbe2af70b7df
-
Size
555KB
-
MD5
ad5fd0e798159e2fd5c9c0e0cd08d9ac
-
SHA1
dee745bddd6ce3a96fbe3d4e78c91d1567a90c0d
-
SHA256
03b07e53297c2d8bb8b214673c909a8b107f1e67948688d47980dbe2af70b7df
-
SHA512
91052f628d3f2d8b1986d0dbdb58044cfe70ca0d8244443fd3c55473c43058261861e68c134f458d8eee5b897511a36e8bc80f34e5f712ee2b79a4f4cd889f7d
-
SSDEEP
12288:qMruy90ROzppoOh2uLcXITqtmvAmdmqaRdDkgBYCGz56DBVJT/qSGCmhh:4ygOdGyIDyVdmqaR9rzCYFT/jfYh
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1